{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-17049","assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","dateUpdated":"2024-11-15T16:12:52.309Z","dateReserved":"2020-08-04T00:00:00.000Z","datePublished":"2020-11-11T00:00:00.000Z"},"containers":{"cna":{"title":"Kerberos KDC Security Feature Bypass Vulnerability","datePublic":"2020-11-10T08:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Windows Server 2019","cpes":["cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.17763.2061","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2019 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.17763.2061","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server, version 1909 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server, version 1903 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server version 2004","cpes":["cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.19041.1110","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2016","cpes":["cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.14393.4530","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2016 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.14393.4530","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 Service Pack 2","cpes":["cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*"],"platforms":["32-bit Systems"],"versions":[{"version":"6.0.0","lessThan":"6.0.6003.21167","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 Service Pack 2 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:*","cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"6.0.0","lessThan":"6.0.6003.21167","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008  Service Pack 2","cpes":["cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.0.0","lessThan":"6.0.6003.21167","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 R2 Service Pack 1","cpes":["cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.1.0","lessThan":"6.1.7601.25661","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 R2 Service Pack 1 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.0.0","lessThan":"6.1.7601.25661","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012","cpes":["cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.2.0","lessThan":"6.2.9200.23409","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.2.0","lessThan":"6.2.9200.23409","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012 R2","cpes":["cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.3.0","lessThan":"6.3.9600.20069","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012 R2 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.3.0","lessThan":"6.3.9600.20069","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server version 20H2","cpes":["cpe:2.3:o:microsoft:windows_server_20H2:10.0.19041.1110:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.19041.1110","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD).\nTo exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it.\nThe update addresses this vulnerability by changing how the KDC validates service tickets used with KCD.","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Security Feature Bypass","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-09-10T15:51:56.659Z"},"references":[{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049"},{"name":"[oss-security] 20211110 Fwd: Samba 4.15.2, 4.14.10, 4.13.14 Security Releases are available for Download","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2021/11/10/3"},{"name":"GLSA-202309-06","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202309-06"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"MEDIUM","baseScore":6.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T13:45:34.908Z"},"title":"CVE Program Container","references":[{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049","tags":["x_transferred"]},{"name":"[oss-security] 20211110 Fwd: Samba 4.15.2, 4.14.10, 4.13.14 Security Releases are available for Download","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2021/11/10/3"},{"name":"GLSA-202309-06","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202309-06"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T16:12:34.390288Z","id":"CVE-2020-17049","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T16:12:52.309Z"}}]}}